An exploitable buffer overflow vulnerability exists in the LoadEncoding functionality of the R programming language version 3.3.0. A specially crafted R script can cause a buffer overflow resulting in a memory corruption. An attacker can send a malicious R script to trigger this vulnerability.
References
Link | Resource |
---|---|
http://www.talosintelligence.com/reports/TALOS-2016-0227/ | Exploit Technical Description Third Party Advisory |
http://www.securityfocus.com/bid/96785 | Third Party Advisory VDB Entry |
http://www.debian.org/security/2017/dsa-3813 | Third Party Advisory |
Information
Published : 2017-03-10 02:59
Updated : 2022-12-14 05:52
NVD link : CVE-2016-8714
Mitre link : CVE-2016-8714
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
debian
- debian_linux
r_project
- r